Skip to content

Commit dd3db8d

Browse files
authored
Merge pull request #105188 from MicrosoftDocs/master
2/21 PM Publish
2 parents 78f3673 + 359caab commit dd3db8d

File tree

141 files changed

+2956
-2280
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

141 files changed

+2956
-2280
lines changed

.openpublishing.redirection.json

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48810,6 +48810,21 @@
4881048810
"source_path": "articles/terraform/terraform-vm-managed-identities-for-azure-resources.md",
4881148811
"redirect_url": "/azure/terraform/terraform-create-complete-vm",
4881248812
"redirect_document_id": false
48813+
},
48814+
{
48815+
"source_path": "articles/cognitive-services/Speech-Service/speech-devices-sdk-android-quickstart.md",
48816+
"redirect_url": "/azure/cognitive-services/speech-service/speech-devices-sdk-quickstart?pivots=platform-android",
48817+
"redirect_document_id": false
48818+
},
48819+
{
48820+
"source_path": "articles/cognitive-services/Speech-Service/speech-devices-sdk-linux-quickstart.md",
48821+
"redirect_url": "/azure/cognitive-services/speech-service/speech-devices-sdk-quickstart?pivots=platform-linux",
48822+
"redirect_document_id": false
48823+
},
48824+
{
48825+
"source_path": "articles/cognitive-services/Speech-Service/speech-devices-sdk-windows-quickstart.md",
48826+
"redirect_url": "/azure/cognitive-services/speech-service/speech-devices-sdk-quickstart?pivots=platform-windows",
48827+
"redirect_document_id": false
4881348828
}
4881448829
]
4881548830
}

articles/active-directory/conditional-access/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
- name: Tutorials
1414
items:
1515
- name: Require Azure Multi-Factor Authentication
16-
href: /authentication/tutorial-enable-azure-mfa.md?toc=/azure/conditional-access/toc.json&bc=/azure/conditional-access/breadcrumb/toc.json
16+
href: ../authentication/tutorial-enable-azure-mfa.md?toc=/azure/active-directory/conditional-access/toc.json&bc=/azure/active-directory/conditional-access/breadcrumb/toc.json
1717
- name: Concepts
1818
expanded: false
1919
items:

articles/active-directory/conditional-access/concept-conditional-access-grant.md

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 02/11/2020
9+
ms.date: 02/21/2020
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -52,13 +52,17 @@ Selecting this checkbox will require users to perform Azure Multi-Factor Authent
5252

5353
Organizations who have deployed Microsoft Intune can use the information returned from their devices to identify devices that meet specific compliance requirements. This policy compliance information is forwarded from Intune to Azure AD where Conditional Access can make decisions to grant or block access to resources. For more information about compliance policies, see the article [Set rules on devices to allow access to resources in your organization using Intune](https://docs.microsoft.com/intune/protect/device-compliance-get-started).
5454

55+
A device can be marked as compliant by Intune (for any device OS) or by third-party MDM system for Windows 10 devices. Third-party MDM systems for device OS types other than Windows 10 are not supported.
56+
57+
Devices must be registered in Azure AD before they can be marked as compliant. More information about device registration can be found in the article, [What is a device identity](../devices/overview.md).
58+
5559
### Require hybrid Azure AD joined device
5660

5761
Organizations can choose to use the device identity as part of their Conditional Access policy. Organizations can require that devices are hybrid Azure AD joined using this checkbox. For more information about device identities, see the article [What is a device identity?](../devices/overview.md).
5862

5963
### Require approved client app
6064

61-
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app.
65+
Organizations can require that an access attempt to the selected cloud apps needs to be made from an approved client app. These approved client aps support [Intune app protection policies](/intune/app-protection-policy) independent of any mobile-device management (MDM) solution.
6266

6367
This setting applies to the following client apps:
6468

@@ -99,9 +103,7 @@ This setting applies to the following client apps:
99103

100104
### Require app protection policy
101105

102-
In your Conditional Access policy, you can require an app protection policy be present on the client app before access is available to the selected cloud apps.
103-
104-
![Control access with app protection policy](./media/technical-reference/22.png)
106+
In your Conditional Access policy, you can require an [Intune app protection policy](/intune/app-protection-policy) be present on the client app before access is available to the selected cloud apps.
105107

106108
This setting applies to the following client apps:
107109

@@ -116,6 +118,10 @@ This setting applies to the following client apps:
116118
- The **Require app protection policy** requirements:
117119
- Only supports the iOS and Android for device platform condition.
118120

121+
### Terms of use
122+
123+
If your organization has created terms of use, additional options may be visible under grant controls. These options allow administrators to require acknowledgment of terms of use as a condition of accessing the resources protected by the policy. More information about terms of use can be found in the article, [Azure Active Directory terms of use](terms-of-use.md).
124+
119125
## Next steps
120126

121127
- [Conditional Access: Session controls](concept-conditional-access-session.md)

articles/active-directory/conditional-access/howto-conditional-access-policy-compliant-device.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,9 @@ The following steps will help create a Conditional Access policy to require devi
4646
1. Confirm your settings and set **Enable policy** to **On**.
4747
1. Select **Create** to create to enable your policy.
4848

49+
> [!NOTE]
50+
> You can enroll your new devices to Intune even if you select **Require device to be marked as compliant** for **All users** and **All cloud apps** using the steps above. **Require device to be marked as compliant** control does not block Intune enrollment.
51+
4952
### Known behavior
5053

5154
On Windows 7, iOS, Android, macOS, and some third-party web browsers Azure AD identifies the device using a client certificate that is provisioned when the device is registered with Azure AD. When a user first signs in through the browser the user is prompted to select the certificate. The end user must select this certificate before they can continue to use the browser.

articles/active-directory/conditional-access/terms-of-use.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ Once you have finalized your terms of use document, use the following procedure
8282
1. For **Terms of use document**, browse to your finalized terms of use PDF and select it.
8383
1. Select the language for your terms of use document. The language option allows you to upload multiple terms of use, each with a different language. The version of the terms of use that an end user will see will be based on their browser preferences.
8484
1. To require end users to view the terms of use prior to accepting them, set **Require users to expand the terms of use** to **On**.
85-
1. To require end users to accept your terms of use on every device they are accessing from, set **Require users to consent on every device** to **On**. For more information, see [Per-device terms of use](#per-device-terms-of-use).
85+
1. To require end users to accept your terms of use on every device they are accessing from, set **Require users to consent on every device** to **On**. Users may be required to install additional applications if this option is enabled. For more information, see [Per-device terms of use](#per-device-terms-of-use).
8686
1. If you want to expire terms of use consents on a schedule, set **Expire consents** to **On**. When set to On, two additional schedule settings are displayed.
8787

8888
![Expire consents settings to set start date, frequency, and duration](./media/terms-of-use/expire-consents.png)
@@ -274,6 +274,10 @@ If a user is using Windows 10 and Microsoft Edge, they will receive a message si
274274

275275
If they are using Chrome, they will be prompted to install the [Windows 10 Accounts extension](https://chrome.google.com/webstore/detail/windows-10-accounts/ppnbnpeolgkicgegkbkbjmhlideopiji).
276276

277+
### Join an Android device
278+
279+
If a user is using an Android device, they will be prompted to install the [Microsoft Authenticator app](https://play.google.com/store/apps/details?id=com.azure.authenticator).
280+
277281
### Browsers
278282

279283
If a user is using browser that is not supported, they will be asked to use a different browser.

articles/active-directory/develop/quickstart-v2-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ In a terminal window, navigate to the folder with the downloaded code sample and
114114
> 1. Build & run the app!
115115
> [!div class="sxs-lookup" renderon="portal"]
116116
> > [!NOTE]
117-
> > This quickstart supports Enter_the_Supported_Account_Info_Here.
117+
> > Enter_the_Supported_Account_Info_Here
118118
> [!div renderon="docs"]
119119
>
120120
> 1. Extract the zip file and open the project in XCode.

articles/active-directory/fundamentals/active-directory-licensing-whatis-azure-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ You must have one of the following licenses to use group-based licensing:
3030

3131
- Paid or trial subscription for Azure AD Premium P1 and above
3232

33-
- Paid or trial edition of Office 365 Enterprise E3 or Office 365 A3 or Office 365 GCC G3 and above
33+
- Paid or trial edition of Office 365 Enterprise E3 or Office 365 A3 or Office 365 GCC G3 or Office 365 E3 for GCCH or Office 365 E3 for DOD and above
3434

3535
### Required number of licenses
3636
For any groups assigned a license, you must also have a license for each unique member. While you don't have to assign each member of the group a license, you must have at least enough licenses to include all of the members. For example, if you have 1,000 unique members who are part of licensed groups in your tenant, you must have at least 1,000 licenses to meet the licensing agreement.

0 commit comments

Comments
 (0)